Slashdot videos: Now with more Slashdot!

View

Discuss

Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

But so I ask, how is this different than online backup service providers like Mozy and CrashPlan that allow client-side encryption and end-to-end encryption??!?!? Or even Amazon S3 for that matter?!

Or taken alternately we can hypothesize that these service providers are different in some way. This would lead us to wonder what is different about these providers that causes the government to leave them alone? That's where things start getting interesting.

So it appears to be linked to the lighting conditions that your eyes are adjusted to when seeing the image initially... even after they've adjusted to the ambient light, the brain appears to stick to the image it created initially.

As for mail order, I'm sure Visa/MC will continue to have a web object that pops up, asks for a PW or PIN, which is used for shopping via the Internet.

This is truly where credit card fraud is going to go in the next few years. As EMV rolls out in the US (finally!) credit card fraud is going to move online. Card not present transactions will be the next target and participation in multifactor authentication schemes like Verified By Visa and MasterCard SecureCode will become critical and possibly even mandatory.

It's also real life imitating art, because the protagonist of Charles Stross' novel Accelerando ( https://en.wikipedia.org/wiki/... ) uses this technique and becomes persona non-grata in the US. The book came out in 2005.

Personally I think it's insane that a civil crime such as a breach of copyright terms is treated as a criminal matter more serious than assaulting someone and leaving them with injuries that will be with them for the rest of their life.

And much like the manufacturer of a hammer, they have no way of knowing whether that hammer will be used to nail together pieces of wood or open up the back of someone's head, and so they are therefore not responsible when someone misuses the tool which is intended for beneficial use.

The perfect keyboard has been around for a long time an IBM M13 mine is nearly 20 years old and in perfect working order. While I like the larger keyboard with f13-24 it's a pita to get many OS's to use them. You can also bludgeon an intruder with it and go back to typing.

BMW's programmers did as much as I'd expect any application programmer to do. It's then time for the security audit, by a truly qualified security person, to catch the kinds of mistakes that the author caught.

No. Security is not an afterthought or something do be approached at the end. It needs to be an integral part of the software development lifecycle from soup to nuts. Anything else results in "ship it now, we'll fix it later" decisions and we end up where BMW is today.

Fortunately your friends, relative, and coworkers are willing to help out with that. Each photo uploaded to Facebook with your face tagged in it is a reference photo. Setting your privacy settings to not display those tags doesn't mean the data point wasn't saved.